Question about PC Desktops

1 Answer

Hackers pc I have a problem with all my pc´s.  not my mac.  SOMEONE is hacking into the bios and hijackikng all my pc´s.  They then disable my peripherals.  I even tried to download ubuntu, since I am tired of spending money on pc´s.  that didn´t work.  It seems to have something to do with the bios shadowing, and virtual private networks.  They are accessing my pc´s without telephone lines connected and even unplugged with no monitor.  I had a junk pc I bought for $20 That sat with no plug, monitor, keyboard because it was junk.  Somehow they changed the icon for ¨my computer¨to a trash can.  All my computers seem to be booting off a virtual machine somewhere somehow.  I managed to put ubuntu on junk pc, but when I realized it had a partiioner, of course I reformatted the hd.  That must´ve annoyed whoever, because they erased the partition manager from the installed ubuntu version, and won´t let me boot from the disk in the disk drive.  I have a mac that obviously doesn´t have a bios, but this is ticking me off royally.  How can I prevent these people from doing this?  Yes, contacted the cops.  pretty much know who it is.  what do I do to get back control over my pc´s?  No, I am not crazy.  They won´t let me reinstall the os, nor get on the internet with my pc´s.  The junk pc is an old hewlet packard that ran windows 98.  13 gig 386 intel 466 mz.  Its a desktop.

Posted by on

  • Ryan Churchill
    Ryan Churchill May 11, 2010

    I am a Certified Ethical Hacker, and what you are describing above is not possible. Please clarify your request.



    Based on above, you seem to be paranoid, as nobody is hacking your disconnected, powered off computer with no keyboard or monitor connected.

×

1 Answer

  • Level 2:

    An expert who has achieved level 2 by getting 100 points

    All-Star:

    An expert that got 10 achievements.

    MVP:

    An expert that got 5 achievements.

    Sergeant:

    An expert that has over 500 points.

  • Expert
  • 237 Answers

Not intending to encourage this paranoia theme, but do you lock your doors when you leave or gave a key to a friend who may be doing a trick? Otherwise, I would have to agree with the above. Make sure you are not downloading anything with adware, spyware, etc. Get a security software as well.
One other thought, because this is an old, old pc, the hardware could be malfunctioning, with not enoough memory or storage. Consider getting a newer desktop if you need one.

Posted on Dec 12, 2008

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

2 Answers

How do I delete or disable the chip tracking serial number in my Bios with an HP pro 3500 series desktop


I suspect this cannot be done (unless you are an expert hacker :) )

This number exists to tie presupplied software to your computer for licensing reasons.

(I ma not be correct on this)

12.April.2014

Dec 31, 2013 | HP Pro 3500 Microtower Business Desktop -...

Tip

Prevent Your PC from Getting Hacked


Here , we will see how to prevent PC's from getting hacked : Most people think that hackers are only a problem for servers. This is not true. If your Windows PC is not properly configured, everything on your computer can easily be stolen or destroyed by hackers. Our network architecture is inherently hacker-resistant. However, because your PCs are directly connected to the Internet, hackers can bypass our servers and attack your PCs directly. Our firewall will help to some extent, but you must follow basic precautions if you want your data to be safe. Viruses: It is impossible for the servers to get computer viruses, because they run Unix, which cannot be infected by viruses. A virus must be executed before it can infect a computer. On Windows, programs like Internet Explorer and Outlook often execute files without your knowledge, which is what causes most virus infections. However, these files (or any Windows program) cannot be executed on the server. Some Windows viruses put copies of themselves on the server's shared disks. To the server, these are just ordinary files. The server is set up to periodically delete them to save space. They are not a problem unless you click on them. Clicking is the root of all evil. Here are some basic precautions to protect against hackers.
  1. Goto windowsupdate.microsoft.com at least once a week and install all critical patches.
  2. Run an antivirus program at least once a week. Update your virus signature files every time you use it.
  3. Use a firewall such as Zone Alarm. (Some firewalls have had major security problems. Be sure you have the latest update)
  4. Check your computer for trojans by clicking on: http://security.symantec.com http://www.trojanscan.com
  5. Don't click on email attachments.
  6. Don't install Napster, Kazaa, ChainCast, or any software from an unknown source. The former will turn your computer into a server and the latter may contain trojans and viruses.
  7. Turn off sharing, especially on your C:\ and D:\ drive. This is very dangerous! If you must share a disk, make sure it requires a password. Otherwise, anyone in the Internet can use your computer to back up their files without your knowledge. Never share any folder without a password.
  8. Put a good password on your PC. If you have a password on your PC that is easy to guess, your computer can be easily taken over by hackers.
    A bad password would be things like 'password', '12345', your name, license plate number, or any word that could be found in an English dictionary or a dictionary in your native language.
  9. Report any network slowness or strange computer behavior so it can be checked by me (if it's a network problem) or Brad (if it's a Windows or Mac problem).
  10. Windows PCs with static IP numbers are especially easy targets. You should always set "Obtain an IP address automatically" in Windows unless you are running a server and you are knowledgeable in computer security.

Here are some more tips:
  1. Please give your computer a sensible name. If we can't find your computer when it causes a problem, the only way to fix it is by unplugging it from the network.
  2. Don't store files in the /tmp directory on the servers (engram or protein). They are not safe there! If someone else gets a virus, their computer can put copies of the virus on the shared disk, mixed in with your files. The server cannot be infected by these viruses, but your PC could. Keep your backups in your home directory where they are safe and private.
  3. If you use Windows 2000 or NT, activate auditing of all system events, especially failures. This will you help discover how the hacker obtained access. Without this knowledge, it will be difficult to know what to change when you reinstall your operating system. Be sure to scan through the logs occasionally for unusual activity.
  4. Avoid executable content in web pages and email. Disable ActiveX. You can check your Internet Explorer installation for Active X security problems at this web site: http://www.tiac.net/users/smiths/acctroj/axcheck.htm
  5. Disable automatic execution of Macros in Office programs (Word, Excel, etc).
  6. Use SSH in preference to telnet. You can replace it with the freeware TeraTerm client with the SSH plugin.
  7. Unbind the unneeded network settings in Windows. This is easy to do, and will greatly increase your security. Follow the instructions at http://grc.com/su-rebinding9x.htm
  8. If a hacker gets on your computer, or you discover a trojan on your computer and suspect it is being actively exploited, unplug it from the network immediately and ask for assistance. Don't delete any files. We may need to check them to find out how the attacker got into your system.
  9. If your computer has been compromised by a trojan or an intruder, it cannot be repaired by removing the foreign software. There are dozens of different ways for a hacker to regain access, despite our firewall, that are impossible for any scanning software to find. The only way to repair your computer is to reformat your disk and reinstall the operating system. Until you do this, your computer is a threat to every one else's computer.
If you don't follow these guidelines, we won't nag you to change, but sooner or later your computer will be trashed by a hacker, trojan, or virus. Some people have already discovered this the hard way.

on Jun 27, 2010 | PC Desktops

1 Answer

Facebook hackers


Make another profile with a fake name and report the old Profile as Hacked and recover it

Nov 25, 2013 | Dell GX270 P4 256/40/48X/XPP/NONE...

1 Answer

Hack


Hacking is only illegal if you don't have the person's permission to hack into their system. There are professional hackers who get paid to break into companies servers in order to test out the security.

Here are the laws on the subject:
http://www.ncsl.org/IssuesResearch/TelecommunicationsInformationTechnology/ComputerHackingandUnauthorizedAccessLaws/tabid/13494/Default.aspx

Feb 17, 2011 | PC Desktops

1 Answer

I cant log in to my computer i put my password & it says wrong password please help


Do you have a reset USB? If you do, plug it in and click reset. If you can't, try searching the web on how to use BIOS and Safe Mode to help you.
Possible Reasons: 1. Your computer was hacked by a hacker 2. You changed your password and forgot 3. Someone could have absent mindedly clicked something
To prevent in the future, you should create for an account for every user, and try to defend yourself against hackers, by always having the most up to date anti-virus software.

Feb 04, 2011 | PC Desktops

1 Answer

Hackers


google the IP addresses and find their connected server (ie. 192.168.1.1 could be tied to testurl.com). upgrade your internet security (firewall, anti-virus, anti-spam, anti-spyware, anti-malware) and google CCleaner, download, and use. and if you use a wireless router, up the security on it by enabling WAP or WEP so no one on the outside of the network without the password can snoop in on what you're doing and gain access to your systems.

Sep 19, 2009 | Compaq PC Desktops

1 Answer

Hacker


No anyone can send you an e-mail you can check on the origination of the e-mail by looking at the IP address and going to whois.com to see the webmaster for the mail holder.
Send e-mail to the webmaster and tell him/her your concerns and they may be able to help…Hope that help you and please do not forget to rate my service to be able to improve on it and help everyone.

Sep 19, 2009 | PC Desktops

2 Answers

Where can i find a replacement harddrive....my sytem has been hacked! Someone was able to hack into all four of my email accts, change settings on them, are sending this information to other...


You are not alone! You do have a serious but fixable issue, contact your ISP or email service providers and alert them to the hack. Unless they can assist you with changing the passwords then you will have to abandon those accounts. You providers can make certain the accounts are deactivated. To ensure removal of any residual code from a hacker, you need to slick and restore the current HDD in your system, if you have a recovery media with the system back up all your personal files you want to keep and use it. Then make certain you have all the patches and updates applied to your machine and consider D/L or purchasing of anit virus software immediately. Also make all your passwords complex, Use Upper and Lower case, numbers and symbols with atleast 12 characters. I suggest also purchasing a USB HDD to use as your private file storage and discoonect it from your system when not in use. NEVER share passwords with anyone! Good Luck

Jul 23, 2009 | Acer Aspire M1641-U1521A PC Desktop

1 Answer

My hotmail acount got hacked


Not really, you might be able to get it back, but it's a lot easier to try and get a similar sounding gmail, acct. Someone has access to your machine, or account. I wouldn't take the chance that they get it again. just go for a ne one.

Dec 15, 2008 | PC Desktops

1 Answer

Hacker tried to get into my computer


192.168.X.X is an internal network address...your "hacker" is either in the same room, or at least on your network, the other is an IP in San Francisco, CA, and PPPoE is a very unlikely method for a "hacker" to use, it's actually a very secure method of connecting 2 computers over the internet.

Mar 14, 2008 | PC Desktops

Not finding what you are looking for?
PC Desktops Logo

Related Topics:

58 people viewed this question

Ask a Question

Usually answered in minutes!

Top PC Desktops Experts

joecoolvette
joecoolvette

Level 3 Expert

5660 Answers

Brian Sullivan
Brian Sullivan

Level 3 Expert

27725 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18304 Answers

Are you a PC Desktop Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...